[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rachana et al., 2021 - Google Patents

Detection of Malicious Content or Web Links Related to Cyberfrauds

Rachana et al., 2021

View PDF
Document ID
3003471834568909864
Author
Rachana G
Nandakishor B
Publication year

External Links

Snippet

Malicious URLs are being extensively used to mount numerous cyber attacks together with spamming, phishing and malware. Detection of malicious URLs and identification of threat sorts lead to critical stage in these attacks. Knowing the kind of a threat permits estimation of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US10243991B2 (en) Methods and systems for generating dashboards for displaying threat insight information
US10601865B1 (en) Detection of credential spearphishing attacks using email analysis
EP2859495B1 (en) Malicious message detection and processing
Patil et al. Survey on malicious web pages detection techniques
Alkawaz et al. Detecting phishing website using machine learning
Marchal et al. Proactive discovery of phishing related domain names
US8707426B1 (en) Method and apparatus for resolving a cousin domain name to detect web-based fraud
US12021894B2 (en) Phishing detection based on modeling of web page content
CN112567707A (en) Enhanced techniques for generating and deploying dynamic false user accounts
Bhardwaj et al. Privacy-aware detection framework to mitigate new-age phishing attacks
EP3888335A1 (en) Phishing protection methods and systems
US10505979B2 (en) Detection and warning of imposter web sites
Sankhwar et al. Email phishing: an enhanced classification model to detect malicious urls
Dinesh et al. Identification of phishing attacks using machine learning algorithm
Rahman et al. Classification of spamming attacks to blogging websites and their security techniques
Rachana et al. Detection of Malicious Content or Web Links Related to Cyberfrauds
Drury et al. No phishing with the wrong bait: reducing the phishing risk by address separation
Mishra et al. Prevention of phishing attack in internet-of-things based cyber-physical human system
Patel Test utility for live and online testing of an anti-phishing message security system
Hariram Detection of Clickjacking using Convolutional Neural Network
Almousa et al. Anti-Spoofing in Medical Employee's Email using Machine Learning Uclassify Algorithm
Shahila et al. AI Based Phishing Discrement for Immense E-Maildata
Abad et al. Phishing Website Classification Using Features of Web Addresses and Web Pages
Thangammal et al. Analysis Of Phishing Websites Using An Competent Feature-Based Framework
Fonseca Identifying Malicious URLs: A Descriptive Pipeline for Analysis and Implementation